+Mon Feb 20 21:38:20 1995 Keith Vetter (keithv@fusion.com)
+
+ * Makefile.in: made to work on the PC
+
Fri Nov 18 00:17:29 1994 Mark Eichin <eichin@cygnus.com>
* configure.in: move WITH_CCOPTS.
TST=if test -n "`cat DONE`" ; then
-all::
+##DOSBUILDTOP = ..\..
+##DOSLIBNAME=libgssapi_krb5.$(LIBEXT)
+##DOS!include $(BUILDTOP)\config\windows.in
+
+all:: all-$(WHAT)
+
+all-unix::
libgssapi_krb5.a: generic/DONE krb5/DONE
(cd generic; $(TST) $(ARADD) ../$@ `cat DONE` ; fi)
$(INSTALL_DATA) libgssapi_krb5.a $(DESTDIR)$(KRB5_LIBDIR)/libgssapi_krb5.a
$(RANLIB) $(DESTDIR)$(KRB5_LIBDIR)/libgssapi_krb5.a
-clean::
- $(RM) libgssapi_krb5.a
+clean:: clean-$(WHAT)
+ $(RM) libgssapi_krb5.$(LIBEXT) libgssapi_krb5.bak
+
+clean-unix::
+
+all-windows::
+ cd generic
+ @echo Making in ..\generic
+ -$(MAKE) -$(MFLAGS) LIB=$(LIB)
+ cd ..\krb5
+ @echo Making in krb5
+ -$(MAKE) -$(MFLAGS) LIB=$(LIB)
+ cd ..
+
+clean-windows::
+ cd generic
+ @echo Making clean in ..\generic
+ -$(MAKE) -$(MFLAGS) clean
+ cd ..\krb5
+ @echo Making clean in krb5
+ -$(MAKE) -$(MFLAGS) clean
+ cd ..
+
+
+Mon Feb 20 18:50:33 1995 Keith Vetter (keithv@fusion.com)
+
+ * Makefile.in: made to work on the PC
+ * Added windows INTERFACE keyword
+ disp_com.c disp_maj.c rel_buff.c rel_oid_.c
+ util_buf.c util_can.c util_dup.c util_oid.c
+ util_tok.c util_val.c utl_noha.c
+ * gssapiP_generic.h:
+ added INTERFACE keyword
+ removed inclusion
+ * util_tok.c: had to coerce long to int on TWRITE_STR.
+ * gssapi.h: made typedef for OM_uint32 machine independent and
+ added INTERFACE to prototypes.
+
Mon Feb 20 12:00:00 1994 Keith Vetter (keithv@fusion.com)
More DOS 8.3 renames--for files created by make
CFLAGS = $(CCOPTS) $(DEFS) -I. -I$(srcdir)
LDFLAGS = -g
+##DOSBUILDTOP = ..\..\..
+##DOSLIBNAME=..\libgssapi_krb5.$(LIBEXT)
+##DOSsrcdir = .
+##DOS!include $(BUILDTOP)\config\windows.in
+
all:: $(OBJS)
ETSRCS= gssapi_err_generic.c
-ETOBJS= gssapi_err_generic.o
+ETOBJS= gssapi_err_generic.$(OBJEXT)
ETHDRS= gssapi_err_generic.h
-gssapi_err_generic.o: gssapi_err_generic.c
+gssapi_err_generic.$(OBJEXT): gssapi_err_generic.c
gssapi_err_generic.h: gssapi_err_generic.et
#if HasHashLibrary
# UTIL_VALIDATE_SRC= $(srcdir)/util_validate.c
-# UTIL_VALIDATE_OBJ= util_validate.o
+# UTIL_VALIDATE_OBJ= util_validate.$(OBJEXT)
#else
UTIL_VALIDATE_SRC= $(srcdir)/utl_nohash_validate.c
-UTIL_VALIDATE_OBJ= utl_nohash_validate.o
+UTIL_VALIDATE_OBJ= utl_nohash_validate.$(OBJEXT)
#endif
CCSRCS = \
$(UTIL_VALIDATE_SRC)
CCOBJS = \
- disp_major_status.o \
- disp_com_err_status.o \
- gssapi_generic.o \
- rel_buffer.o \
- rel_oid_set.o \
- util_buffer.o \
- util_canonhost.o \
- util_dup.o \
- util_oid.o \
- util_token.o \
+ disp_major_status.$(OBJEXT) \
+ disp_com_err_status.$(OBJEXT) \
+ gssapi_generic.$(OBJEXT) \
+ rel_buffer.$(OBJEXT) \
+ rel_oid_set.$(OBJEXT) \
+ util_buffer.$(OBJEXT) \
+ util_canonhost.$(OBJEXT) \
+ util_dup.$(OBJEXT) \
+ util_oid.$(OBJEXT) \
+ util_token.$(OBJEXT) \
$(UTIL_VALIDATE_OBJ)
-EHDRDIR= $(BUILDTOP)/include/gssapi
+EHDRDIR= $(BUILDTOP)$(S)include$(S)gssapi
EXPORTED_HEADERS= gssapi.h gssapi_generic.h
SRCS= $(ETSRCS) $(CCSRCS)
OBJS= $(ETOBJS) $(CCOBJS)
HDRS= $(ETHDRS)
-all:: $(SRCS) $(HDRS) includes $(OBJS)
+all:: all-$(WHAT) $(SRCS) $(HDRS) includes $(OBJS)
+
+all-unix::
+
+all-windows::
+ if not exist $(EHDRDIR)\nul mkdir $(EHDRDIR)
+ copy gssapi.h $(EHDRDIR)
+ copy gssapi_generic.h $(EHDRDIR)
-clean::
+clean:: clean-$(WHAT)
+
+clean-unix::
$(RM) $(ETHDRS) $(ETSRCS)
+clean-windows::
+ $(RM) $(EHDRDIR)\gssapi.h $(EHDRDIR)\gssapi_generic.h
+ if exist $(EHDRDIR)\nul rmdir $(EHDRDIR)
+
# Krb5InstallHeaders($(EXPORTED_HEADERS), $(KRB5_INCDIR)/krb5)
depend:: $(ETSRCS)
+
+includes::
if status_type == GSS_C_MECH_CODE, return the output from error_message()
*/
-OM_uint32 g_display_com_err_status(minor_status, status_value, status_string)
+OM_uint32 INTERFACE
+g_display_com_err_status(minor_status, status_value, status_string)
OM_uint32 *minor_status;
OM_uint32 status_value;
gss_buffer_t status_string;
message_context > 2 : print supplementary info bit (message_context-2)
*/
-OM_uint32 g_display_major_status(minor_status, status_value,
+OM_uint32 INTERFACE g_display_major_status(minor_status, status_value,
message_context, status_string)
OM_uint32 *minor_status;
OM_uint32 status_value;
/*
* First, define the platform-dependent types.
*/
-typedef unsigned int OM_uint32;
+typedef krb5_ui_4 OM_uint32;
typedef void * gss_name_t;
typedef void * gss_cred_id_t;
typedef void * gss_ctx_id_t;
* Finally, function prototypes for the GSSAPI routines.
*/
-OM_uint32 gss_acquire_cred
+OM_uint32 INTERFACE gss_acquire_cred
PROTOTYPE( (OM_uint32*, /* minor_status */
gss_name_t, /* desired_name */
OM_uint32, /* time_req */
OM_uint32* /* time_rec */
));
-OM_uint32 gss_release_cred
+OM_uint32 INTERFACE gss_release_cred
PROTOTYPE( (OM_uint32*, /* minor_status */
gss_cred_id_t* /* cred_handle */
));
-OM_uint32 gss_init_sec_context
+OM_uint32 INTERFACE gss_init_sec_context
PROTOTYPE( (OM_uint32*, /* minor_status */
gss_cred_id_t, /* claimant_cred_handle */
gss_ctx_id_t*, /* context_handle */
OM_uint32* /* time_rec */
));
-OM_uint32 gss_accept_sec_context
+OM_uint32 INTERFACE gss_accept_sec_context
PROTOTYPE( (OM_uint32*, /* minor_status */
gss_ctx_id_t*, /* context_handle */
gss_cred_id_t, /* verifier_cred_handle */
gss_cred_id_t* /* delegated_cred_handle */
));
-OM_uint32 gss_process_context_token
+OM_uint32 INTERFACE gss_process_context_token
PROTOTYPE( (OM_uint32*, /* minor_status */
gss_ctx_id_t, /* context_handle */
gss_buffer_t /* token_buffer */
));
-OM_uint32 gss_delete_sec_context
+OM_uint32 INTERFACE gss_delete_sec_context
PROTOTYPE( (OM_uint32*, /* minor_status */
gss_ctx_id_t*, /* context_handle */
gss_buffer_t /* output_token */
));
-OM_uint32 gss_context_time
+OM_uint32 INTERFACE gss_context_time
PROTOTYPE( (OM_uint32*, /* minor_status */
gss_ctx_id_t, /* context_handle */
OM_uint32* /* time_rec */
));
-OM_uint32 gss_sign
+OM_uint32 INTERFACE gss_sign
PROTOTYPE( (OM_uint32*, /* minor_status */
gss_ctx_id_t, /* context_handle */
int, /* qop_req */
gss_buffer_t /* message_token */
));
-OM_uint32 gss_verify
+OM_uint32 INTERFACE INTERFACE gss_verify
PROTOTYPE( (OM_uint32*, /* minor_status */
gss_ctx_id_t, /* context_handle */
gss_buffer_t, /* message_buffer */
int* /* qop_state */
));
-OM_uint32 gss_seal
+OM_uint32 INTERFACE gss_seal
PROTOTYPE( (OM_uint32*, /* minor_status */
gss_ctx_id_t, /* context_handle */
int, /* conf_req_flag */
gss_buffer_t /* output_message_buffer */
));
-OM_uint32 gss_unseal
+OM_uint32 INTERFACE gss_unseal
PROTOTYPE( (OM_uint32*, /* minor_status */
gss_ctx_id_t, /* context_handle */
gss_buffer_t, /* input_message_buffer */
int* /* qop_state */
));
-OM_uint32 gss_display_status
+OM_uint32 INTERFACE gss_display_status
PROTOTYPE( (OM_uint32*, /* minor_status */
OM_uint32, /* status_value */
int, /* status_type */
gss_buffer_t /* status_string */
));
-OM_uint32 gss_indicate_mechs
+OM_uint32 INTERFACE gss_indicate_mechs
PROTOTYPE( (OM_uint32*, /* minor_status */
gss_OID_set* /* mech_set */
));
-OM_uint32 gss_compare_name
+OM_uint32 INTERFACE gss_compare_name
PROTOTYPE( (OM_uint32*, /* minor_status */
gss_name_t, /* name1 */
gss_name_t, /* name2 */
int* /* name_equal */
));
-OM_uint32 gss_display_name
+OM_uint32 INTERFACE gss_display_name
PROTOTYPE( (OM_uint32*, /* minor_status */
gss_name_t, /* input_name */
gss_buffer_t, /* output_name_buffer */
gss_OID* /* output_name_type */
));
-OM_uint32 gss_import_name
+OM_uint32 INTERFACE gss_import_name
PROTOTYPE( (OM_uint32*, /* minor_status */
gss_buffer_t, /* input_name_buffer */
const_gss_OID, /* input_name_type */
gss_name_t* /* output_name */
));
-OM_uint32 gss_release_name
+OM_uint32 INTERFACE gss_release_name
PROTOTYPE( (OM_uint32*, /* minor_status */
gss_name_t* /* input_name */
));
-OM_uint32 gss_release_buffer
+OM_uint32 INTERFACE gss_release_buffer
PROTOTYPE( (OM_uint32*, /* minor_status */
gss_buffer_t /* buffer */
));
-OM_uint32 gss_release_oid_set
+OM_uint32 INTERFACE gss_release_oid_set
PROTOTYPE( (OM_uint32*, /* minor_status */
gss_OID_set* /* set */
));
-OM_uint32 gss_inquire_cred
+OM_uint32 INTERFACE gss_inquire_cred
PROTOTYPE( (OM_uint32 *, /* minor_status */
gss_cred_id_t, /* cred_handle */
gss_name_t *, /* name */
gss_OID_set * /* mechanisms */
));
-OM_uint32 gss_inquire_context
+OM_uint32 INTERFACE gss_inquire_context
PROTOTYPE( (OM_uint32*, /* minor_status */
gss_ctx_id_t, /* context_handle */
gss_name_t*, /* initiator_name */
#include "gssapi_err_generic.h"
#include <errno.h>
#include <sys/types.h>
-#include <netinet/in.h>
/** helper macros **/
#define g_OID_equal(o1,o2) \
(((o1)->length == (o2)->length) && \
- (memcmp((o1)->elements,(o2)->elements,(o1)->length) == 0))
+ (memcmp((o1)->elements,(o2)->elements,(int) (o1)->length) == 0))
/* this code knows that an int on the wire is 32 bits. The type of
num should be at least this big, or the extra shifts may do weird
/** helper functions **/
-int g_save_name PROTOTYPE((void **vdb, gss_name_t *name));
-int g_save_cred_id PROTOTYPE((void **vdb, gss_cred_id_t *cred));
-int g_save_ctx_id PROTOTYPE((void **vdb, gss_ctx_id_t *ctx));
+int INTERFACE g_save_name PROTOTYPE((void **vdb, gss_name_t *name));
+int INTERFACE g_save_cred_id PROTOTYPE((void **vdb, gss_cred_id_t *cred));
+int INTERFACE g_save_ctx_id PROTOTYPE((void **vdb, gss_ctx_id_t *ctx));
-int g_validate_name PROTOTYPE((void **vdb, gss_name_t *name));
-int g_validate_cred_id PROTOTYPE((void **vdb, gss_cred_id_t *cred));
-int g_validate_ctx_id PROTOTYPE((void **vdb, gss_ctx_id_t *ctx));
+int INTERFACE g_validate_name PROTOTYPE((void **vdb, gss_name_t *name));
+int INTERFACE g_validate_cred_id PROTOTYPE((void **vdb, gss_cred_id_t *cred));
+int INTERFACE g_validate_ctx_id PROTOTYPE((void **vdb, gss_ctx_id_t *ctx));
-int g_delete_name PROTOTYPE((void **vdb, gss_name_t *name));
-int g_delete_cred_id PROTOTYPE((void **vdb, gss_cred_id_t *cred));
-int g_delete_ctx_id PROTOTYPE((void **vdb, gss_ctx_id_t *ctx));
+int INTERFACE g_delete_name PROTOTYPE((void **vdb, gss_name_t *name));
+int INTERFACE g_delete_cred_id PROTOTYPE((void **vdb, gss_cred_id_t *cred));
+int INTERFACE g_delete_ctx_id PROTOTYPE((void **vdb, gss_ctx_id_t *ctx));
-int g_make_string_buffer PROTOTYPE((const char *str, gss_buffer_t buffer));
+int INTERFACE g_make_string_buffer PROTOTYPE((const char *str, gss_buffer_t buffer));
-int g_copy_OID_set PROTOTYPE((const gss_OID_set_desc * const in, gss_OID_set *out));
+int INTERFACE g_copy_OID_set PROTOTYPE((const gss_OID_set_desc * const in, gss_OID_set *out));
-int g_token_size PROTOTYPE((const_gss_OID mech, unsigned int body_size));
+int INTERFACE g_token_size PROTOTYPE((const_gss_OID mech, unsigned int body_size));
-void g_make_token_header PROTOTYPE((const_gss_OID mech, int body_size,
+void INTERFACE g_make_token_header PROTOTYPE((const_gss_OID mech, int body_size,
unsigned char **buf, int tok_type));
-int g_verify_token_header PROTOTYPE((const_gss_OID mech, int *body_size,
+int INTERFACE g_verify_token_header PROTOTYPE((const_gss_OID mech, int *body_size,
unsigned char **buf, int tok_type, int toksize));
-OM_uint32 g_display_major_status PROTOTYPE((OM_uint32 *minor_status,
+OM_uint32 INTERFACE g_display_major_status PROTOTYPE((OM_uint32 *minor_status,
OM_uint32 status_value,
int *message_context,
gss_buffer_t status_string));
-OM_uint32 g_display_com_err_status PROTOTYPE((OM_uint32 *minor_status,
+OM_uint32 INTERFACE INTERFACE g_display_com_err_status PROTOTYPE((OM_uint32 *minor_status,
OM_uint32 status_value,
gss_buffer_t status_string));
-char *g_canonicalize_host PROTOTYPE((char *hostname));
+char * INTERFACE g_canonicalize_host PROTOTYPE((char *hostname));
-char *g_strdup PROTOTYPE((char *str));
+char * INTERFACE g_strdup PROTOTYPE((char *str));
/** declarations of internal name mechanism functions **/
-OM_uint32 generic_gss_release_buffer
+OM_uint32 INTERFACE generic_gss_release_buffer
PROTOTYPE( (OM_uint32*, /* minor_status */
gss_buffer_t /* buffer */
));
-OM_uint32 generic_gss_release_oid_set
+OM_uint32 INTERFACE generic_gss_release_oid_set
PROTOTYPE( (OM_uint32*, /* minor_status */
gss_OID_set* /* set */
));
#include "gssapiP_generic.h"
-OM_uint32 generic_gss_release_buffer(minor_status, buffer)
+OM_uint32 INTERFACE generic_gss_release_buffer(minor_status, buffer)
OM_uint32 *minor_status;
gss_buffer_t buffer;
{
#include "gssapiP_generic.h"
-OM_uint32 generic_gss_release_oid_set(minor_status, set)
+OM_uint32 INTERFACE generic_gss_release_oid_set(minor_status, set)
OM_uint32 *minor_status;
gss_OID_set *set;
{
make sure that buffer is consistent (release'able) when this
function exits, no matter what the exit value */
-int g_make_string_buffer(str, buffer)
+int INTERFACE g_make_string_buffer(str, buffer)
const char *str;
gss_buffer_t buffer;
{
*/
/* This file could be OS specific */
-
#include "gssapiP_generic.h"
-
+#ifndef _MSDOS
#include <sys/types.h>
#include <sys/socket.h>
#include <netdb.h>
#include <ctype.h>
-char *g_canonicalize_host(hostname)
+char * INTERFACE
+g_canonicalize_host(hostname)
char *hostname;
{
struct hostent *hent;
return(canon);
}
+#endif
#include "gssapiP_generic.h"
-char *g_strdup(str)
+char * INTERFACE g_strdup(str)
char *str;
{
char *ret;
#include "gssapiP_generic.h"
-int
+int INTERFACE
g_copy_OID_set(in, out)
const gss_OID_set_desc * const in;
gss_OID_set *out;
/* returns the length of a token, given the mech oid and the body size */
-int g_token_size(mech, body_size)
+int INTERFACE g_token_size(mech, body_size)
const_gss_OID mech;
unsigned int body_size;
{
/* fills in a buffer with the token header. The buffer is assumed to
be the right size. buf is advanced past the token header */
-void g_make_token_header(mech, body_size, buf, tok_type)
+void INTERFACE g_make_token_header(mech, body_size, buf, tok_type)
const_gss_OID mech;
int body_size;
unsigned char **buf;
der_write_length(buf, 4 + mech->length + body_size);
*(*buf)++ = 0x06;
*(*buf)++ = (unsigned char) mech->length;
- TWRITE_STR(*buf, mech->elements, mech->length);
+ TWRITE_STR(*buf, mech->elements, ((int) mech->length));
*(*buf)++ = (unsigned char) ((tok_type>>8)&0xff);
*(*buf)++ = (unsigned char) (tok_type&0xff);
}
leaving buf advanced past the token header, and setting body_size
to the number of remaining bytes */
-int g_verify_token_header(mech, body_size, buf, tok_type, toksize)
+int INTERFACE g_verify_token_header(mech, body_size, buf, tok_type, toksize)
const_gss_OID mech;
int *body_size;
unsigned char **buf;
/* save */
-int g_save_name(void **vdb, gss_name_t *name)
+int INTERFACE g_save_name(void **vdb, gss_name_t *name)
{
return(g_save((DB **) vdb, V_NAME, (void *) name));
}
-int g_save_cred_id(void **vdb, gss_cred_id_t *cred)
+int INTERFACE g_save_cred_id(void **vdb, gss_cred_id_t *cred)
{
return(g_save((DB **) vdb, V_CRED_ID, (void *) cred));
}
-int g_save_ctx_id(void **vdb, gss_ctx_id_t *ctx)
+int INTERFACE g_save_ctx_id(void **vdb, gss_ctx_id_t *ctx)
{
return(g_save((DB **) vdb, V_CTX_ID, (void *) ctx));
}
/* validate */
-int g_validate_name(void **vdb, gss_name_t *name)
+int INTERFACE g_validate_name(void **vdb, gss_name_t *name)
{
return(g_validate((DB **) vdb, V_NAME, (void *) name));
}
-int g_validate_cred_id(void **vdb, gss_cred_id_t *cred)
+int INTERFACE g_validate_cred_id(void **vdb, gss_cred_id_t *cred)
{
return(g_validate((DB **) vdb, V_CRED_ID, (void *) cred));
}
-int g_validate_ctx_id(void **vdb, gss_ctx_id_t *ctx)
+int INTERFACE g_validate_ctx_id(void **vdb, gss_ctx_id_t *ctx)
{
return(g_validate((DB **) vdb, V_CTX_ID, (void *) ctx));
}
/* delete */
-int g_delete_name(void **vdb, gss_name_t *name)
+int INTERFACE g_delete_name(void **vdb, gss_name_t *name)
{
return(g_delete((DB **) vdb, V_NAME, (void *) name));
}
-int g_delete_cred_id(void **vdb, gss_cred_id_t *cred)
+int INTERFACE g_delete_cred_id(void **vdb, gss_cred_id_t *cred)
{
return(g_delete((DB **) vdb, V_CRED_ID, (void *) cred));
}
-int g_delete_ctx_id(void **vdb, gss_ctx_id_t *ctx)
+int INTERFACE g_delete_ctx_id(void **vdb, gss_ctx_id_t *ctx)
{
return(g_delete((DB **) vdb, V_CTX_ID, (void *) ctx));
}
#include "gssapiP_generic.h"
#include <sys/types.h>
-#include <sys/file.h>
#include <limits.h>
/* functions for each type */
/* save */
-int g_save_name(vdb, name)
+int INTERFACE g_save_name(vdb, name)
void **vdb;
gss_name_t *name;
{
return 1;
}
-int g_save_cred_id(vdb, cred)
+int INTERFACE g_save_cred_id(vdb, cred)
void **vdb;
gss_cred_id_t *cred;
{
return 1;
}
-int g_save_ctx_id(vdb, ctx)
+int INTERFACE g_save_ctx_id(vdb, ctx)
void **vdb;
gss_ctx_id_t *ctx;
{
/* validate */
-int g_validate_name(vdb, name)
+int INTERFACE g_validate_name(vdb, name)
void **vdb;
gss_name_t *name;
{
return 1;
}
-int g_validate_cred_id(vdb, cred)
+int INTERFACE g_validate_cred_id(vdb, cred)
void **vdb;
gss_cred_id_t *cred;
{
return 1;
}
-int g_validate_ctx_id(vdb, ctx)
+int INTERFACE g_validate_ctx_id(vdb, ctx)
void **vdb;
gss_ctx_id_t *ctx;
{
/* delete */
-int g_delete_name(vdb, name)
+int INTERFACE g_delete_name(vdb, name)
void **vdb;
gss_name_t *name;
{
return 1;
}
-int g_delete_cred_id(vdb, cred)
+int INTERFACE g_delete_cred_id(vdb, cred)
void **vdb;
gss_cred_id_t *cred;
{
return 1;
}
-int g_delete_ctx_id(vdb, ctx)
+int INTERFACE g_delete_ctx_id(vdb, ctx)
void **vdb;
gss_ctx_id_t *ctx;
{
+Mon Feb 20 19:53:9 1995 Keith Vetter (keithv@fusion.com)
+
+ * accept_s.c: needed temp to avoid sign/unsigned mismatch on the PC.
+ * init_sec.c: needed temp to avoid sign/unsigned mismatch on the PC.
+ * gssapiP_krb5.h k5seal.c, k5unseal.c: removed netinet/in.h include.
+ * util_seq.c: changed int to 32bit int
+ * gssapiP_krb5.h, gssapi_krb5.h, *.c: added windows INTERFACE keyword
+
Mon Feb 20 12:00:00 1995 keith Vetter (keithv@fusion.com)
Rename files for DOS 8.3 uniqueness--files created by Make
CFLAGS = $(CCOPTS) $(DEFS) -I. -I$(srcdir) -I../generic -I$(srcdir)/../generic
LDFLAGS = -g
+##DOSBUILDTOP = ..\..\..
+##DOSLIBNAME=..\libgssapi_krb5.$(LIBEXT)
+##DOSsrcdir = .
+##DOS!include $(BUILDTOP)\config\windows.in
+
all:: $(OBJS)
ETSRCS= gssapi_err_krb5.c
-ETOBJS= gssapi_err_krb5.o
+ETOBJS= gssapi_err_krb5.$(OBJEXT)
ETHDRS= gssapi_err_krb5.h
-gssapi_err_krb5.o: gssapi_err_krb5.c
+gssapi_err_krb5.$(OBJEXT): gssapi_err_krb5.c
gssapi_err_krb5.h: gssapi_err_krb5.et
$(srcdir)/verify.c
CCOBJS = \
- accept_sec_context.o \
- acquire_cred.o \
- compare_name.o \
- context_time.o \
- delete_sec_context.o \
- disp_name.o \
- disp_status.o \
- get_tkt_flags.o \
- gssapi_krb5.o \
- import_name.o \
- indicate_mechs.o \
- init_sec_context.o \
- inq_context.o \
- inq_cred.o \
- k5seal.o \
- k5unseal.o \
- krb5_gss_glue.o \
- process_context_token.o \
- rel_cred.o \
- rel_name.o \
- seal.o \
- sign.o \
- unseal.o \
- util_cksum.o \
- util_crypt.o \
- util_seed.o \
- util_seqnum.o \
- verify.o
+ accept_sec_context.$(OBJEXT) \
+ acquire_cred.$(OBJEXT) \
+ compare_name.$(OBJEXT) \
+ context_time.$(OBJEXT) \
+ delete_sec_context.$(OBJEXT) \
+ disp_name.$(OBJEXT) \
+ disp_status.$(OBJEXT) \
+ get_tkt_flags.$(OBJEXT) \
+ gssapi_krb5.$(OBJEXT) \
+ import_name.$(OBJEXT) \
+ indicate_mechs.$(OBJEXT) \
+ init_sec_context.$(OBJEXT) \
+ inq_context.$(OBJEXT) \
+ inq_cred.$(OBJEXT) \
+ k5seal.$(OBJEXT) \
+ k5unseal.$(OBJEXT) \
+ krb5_gss_glue.$(OBJEXT) \
+ process_context_token.$(OBJEXT) \
+ rel_cred.$(OBJEXT) \
+ rel_name.$(OBJEXT) \
+ seal.$(OBJEXT) \
+ sign.$(OBJEXT) \
+ unseal.$(OBJEXT) \
+ util_cksum.$(OBJEXT) \
+ util_crypt.$(OBJEXT) \
+ util_seed.$(OBJEXT) \
+ util_seqnum.$(OBJEXT) \
+ verify.$(OBJEXT)
SRCS= $(ETSRCS) $(CCSRCS)
OBJS= $(ETOBJS) $(CCOBJS)
all:: $(SRCS) $(HDRS) includes $(OBJS)
-clean::
+clean:: clean-$(WHAT)
+
+clean-unix::
$(RM) $(ETHDRS) $(ETSRCS)
+clean-windows::
+
depend:: $(ETSRCS)
includes::
return(0);
}
-OM_uint32
+OM_uint32 INTERFACE
krb5_gss_accept_sec_context(context, minor_status, context_handle,
verifier_cred_handle, input_token,
input_chan_bindings, src_name, mech_type,
gss_cred_id_t *delegated_cred_handle;
{
unsigned char *ptr, *ptr2;
+ char *sptr;
long tmp;
int bigend;
krb5_gss_cred_id_t cred;
return(GSS_S_DEFECTIVE_TOKEN);
}
- TREAD_STR(ptr, ap_req.data, ap_req.length);
+ sptr = (char *) ptr;
+ TREAD_STR(sptr, ap_req.data, ap_req.length);
/* construct the sender_addr */
/* decode the message */
if (code = krb5_rd_req(context, &ap_req, cred->princ, paddr, NULL,
- &rd_req_keyproc, (krb5_pointer) cred->keytab,
- rcache, &authdat)) {
+ (krb5_rdreq_key_proc) rd_req_keyproc,
+ (krb5_pointer) cred->keytab, rcache, &authdat)) {
(void) krb5_rc_close(context, rcache);
*minor_status = code;
return(GSS_S_FAILURE);
}
/*ARGSUSED*/
-OM_uint32
+OM_uint32 INTERFACE
krb5_gss_acquire_cred(context, minor_status, desired_name, time_req,
desired_mechs, cred_usage, output_cred_handle,
actual_mechs, time_rec)
#include "gssapiP_krb5.h"
-OM_uint32
+OM_uint32 INTERFACE
krb5_gss_compare_name(context, minor_status, name1, name2, name_equal)
krb5_context context;
OM_uint32 *minor_status;
#include "gssapiP_krb5.h"
-OM_uint32
+OM_uint32 INTERFACE
krb5_gss_context_time(context, minor_status, context_handle, time_rec)
krb5_context context;
OM_uint32 *minor_status;
#include "gssapiP_krb5.h"
-OM_uint32
+OM_uint32 INTERFACE
krb5_gss_delete_sec_context(context, minor_status, context_handle, output_token)
krb5_context context;
OM_uint32 *minor_status;
#include "gssapiP_krb5.h"
-OM_uint32
+OM_uint32 INTERFACE
krb5_gss_display_name(context, minor_status, input_name, output_name_buffer,
output_name_type)
krb5_context context;
/**/
-OM_uint32
+OM_uint32 INTERFACE
krb5_gss_display_status(context, minor_status, status_value, status_type,
mech_type, message_context, status_string)
krb5_context context;
#include "gssapiP_krb5.h"
-OM_uint32
+OM_uint32 INTERFACE
gss_krb5_get_tkt_flags(minor_status, context_handle, ticket_flags)
OM_uint32 *minor_status;
gss_ctx_id_t context_handle;
#include <krb5/krb5.h>
#include <memory.h>
-#include <netinet/in.h>
/* work around sunos braindamage */
#ifdef major
/** helper functions **/
-OM_uint32 kg_get_defcred
+OM_uint32 INTERFACE kg_get_defcred
PROTOTYPE((OM_uint32 *minor_status,
gss_cred_id_t *cred));
-OM_uint32 kg_release_defcred PROTOTYPE((OM_uint32 *minor_status));
+OM_uint32 INTERFACE kg_release_defcred PROTOTYPE((OM_uint32 *minor_status));
-krb5_error_code kg_checksum_channel_bindings PROTOTYPE((gss_channel_bindings_t cb,
+krb5_error_code INTERFACE kg_checksum_channel_bindings
+ PROTOTYPE((gss_channel_bindings_t cb,
krb5_checksum *cksum,
int bigend));
-krb5_error_code kg_make_seq_num PROTOTYPE((krb5_gss_enc_desc *ed, int direction,
- int seqnum, unsigned char *cksum,
+krb5_error_code INTERFACE kg_make_seq_num PROTOTYPE((krb5_gss_enc_desc *ed,
+ int direction, krb5_int32 seqnum, unsigned char *cksum,
unsigned char *buf));
-krb5_error_code kg_make_seed PROTOTYPE((krb5_keyblock *key, unsigned char *seed));
+krb5_error_code INTERFACE kg_make_seed PROTOTYPE((krb5_keyblock *key,
+ unsigned char *seed));
-int kg_confounder_size PROTOTYPE((krb5_gss_enc_desc *ed));
+int INTERFACE kg_confounder_size PROTOTYPE((krb5_gss_enc_desc *ed));
-krb5_error_code kg_make_confounder PROTOTYPE((krb5_gss_enc_desc *ed, unsigned char *buf));
+krb5_error_code INTERFACE kg_make_confounder PROTOTYPE((krb5_gss_enc_desc *ed,
+ unsigned char *buf));
-int kg_encrypt_size PROTOTYPE((krb5_gss_enc_desc *ed, int n));
+int INTERFACE kg_encrypt_size PROTOTYPE((krb5_gss_enc_desc *ed, int n));
-krb5_error_code kg_encrypt PROTOTYPE((krb5_gss_enc_desc *ed, krb5_pointer iv,
- krb5_pointer in, krb5_pointer out, int length));
+krb5_error_code INTERFACE kg_encrypt PROTOTYPE((krb5_gss_enc_desc *ed,
+ krb5_pointer iv, krb5_pointer in, krb5_pointer out, int length));
-krb5_error_code kg_decrypt PROTOTYPE((krb5_gss_enc_desc *ed, krb5_pointer iv,
- krb5_pointer in, krb5_pointer out, int length));
+krb5_error_code INTERFACE kg_decrypt PROTOTYPE((krb5_gss_enc_desc *ed,
+ krb5_pointer iv, krb5_pointer in, krb5_pointer out, int length));
-OM_uint32 kg_seal PROTOTYPE((OM_uint32 *minor_status,
+OM_uint32 INTERFACE kg_seal PROTOTYPE((OM_uint32 *minor_status,
gss_ctx_id_t context_handle,
int conf_req_flag,
int qop_req,
gss_buffer_t output_message_buffer,
int toktype));
-OM_uint32 kg_unseal PROTOTYPE((OM_uint32 *minor_status,
+OM_uint32 INTERFACE kg_unseal PROTOTYPE((OM_uint32 *minor_status,
gss_ctx_id_t context_handle,
gss_buffer_t input_token_buffer,
gss_buffer_t message_buffer,
/** declarations of internal name mechanism functions **/
-OM_uint32 krb5_gss_acquire_cred
+OM_uint32 INTERFACE krb5_gss_acquire_cred
PROTOTYPE( (krb5_context,
OM_uint32*, /* minor_status */
gss_name_t, /* desired_name */
OM_uint32* /* time_rec */
));
-OM_uint32 krb5_gss_release_cred
+OM_uint32 INTERFACE krb5_gss_release_cred
PROTOTYPE( (krb5_context,
OM_uint32*, /* minor_status */
gss_cred_id_t* /* cred_handle */
));
-OM_uint32 krb5_gss_init_sec_context
+OM_uint32 INTERFACE krb5_gss_init_sec_context
PROTOTYPE( (krb5_context,
OM_uint32*, /* minor_status */
gss_cred_id_t, /* claimant_cred_handle */
OM_uint32* /* time_rec */
));
-OM_uint32 krb5_gss_accept_sec_context
+OM_uint32 INTERFACE krb5_gss_accept_sec_context
PROTOTYPE( (krb5_context,
OM_uint32*, /* minor_status */
gss_ctx_id_t*, /* context_handle */
gss_cred_id_t* /* delegated_cred_handle */
));
-OM_uint32 krb5_gss_process_context_token
+OM_uint32 INTERFACE krb5_gss_process_context_token
PROTOTYPE( (krb5_context,
OM_uint32*, /* minor_status */
gss_ctx_id_t, /* context_handle */
gss_buffer_t /* token_buffer */
));
-OM_uint32 krb5_gss_delete_sec_context
+OM_uint32 INTERFACE krb5_gss_delete_sec_context
PROTOTYPE( (krb5_context,
OM_uint32*, /* minor_status */
gss_ctx_id_t*, /* context_handle */
gss_buffer_t /* output_token */
));
-OM_uint32 krb5_gss_context_time
+OM_uint32 INTERFACE krb5_gss_context_time
PROTOTYPE( (krb5_context,
OM_uint32*, /* minor_status */
gss_ctx_id_t, /* context_handle */
OM_uint32* /* time_rec */
));
-OM_uint32 krb5_gss_sign
+OM_uint32 INTERFACE krb5_gss_sign
PROTOTYPE( (krb5_context,
OM_uint32*, /* minor_status */
gss_ctx_id_t, /* context_handle */
gss_buffer_t /* message_token */
));
-OM_uint32 krb5_gss_verify
+OM_uint32 INTERFACE krb5_gss_verify
PROTOTYPE( (krb5_context,
OM_uint32*, /* minor_status */
gss_ctx_id_t, /* context_handle */
int* /* qop_state */
));
-OM_uint32 krb5_gss_seal
+OM_uint32 INTERFACE krb5_gss_seal
PROTOTYPE( (krb5_context,
OM_uint32*, /* minor_status */
gss_ctx_id_t, /* context_handle */
gss_buffer_t /* output_message_buffer */
));
-OM_uint32 krb5_gss_unseal
+OM_uint32 INTERFACE krb5_gss_unseal
PROTOTYPE( (krb5_context,
OM_uint32*, /* minor_status */
gss_ctx_id_t, /* context_handle */
int* /* qop_state */
));
-OM_uint32 krb5_gss_display_status
+OM_uint32 INTERFACE krb5_gss_display_status
PROTOTYPE( (krb5_context,
OM_uint32*, /* minor_status */
OM_uint32, /* status_value */
gss_buffer_t /* status_string */
));
-OM_uint32 krb5_gss_indicate_mechs
+OM_uint32 INTERFACE krb5_gss_indicate_mechs
PROTOTYPE( (krb5_context,
OM_uint32*, /* minor_status */
gss_OID_set* /* mech_set */
));
-OM_uint32 krb5_gss_compare_name
+OM_uint32 INTERFACE krb5_gss_compare_name
PROTOTYPE( (krb5_context,
OM_uint32*, /* minor_status */
gss_name_t, /* name1 */
int* /* name_equal */
));
-OM_uint32 krb5_gss_display_name
+OM_uint32 INTERFACE krb5_gss_display_name
PROTOTYPE( (krb5_context,
OM_uint32*, /* minor_status */
gss_name_t, /* input_name */
gss_OID* /* output_name_type */
));
-OM_uint32 krb5_gss_import_name
+OM_uint32 INTERFACE krb5_gss_import_name
PROTOTYPE( (krb5_context,
OM_uint32*, /* minor_status */
gss_buffer_t, /* input_name_buffer */
gss_name_t* /* output_name */
));
-OM_uint32 krb5_gss_release_name
+OM_uint32 INTERFACE krb5_gss_release_name
PROTOTYPE( (krb5_context,
OM_uint32*, /* minor_status */
gss_name_t* /* input_name */
));
-OM_uint32 krb5_gss_inquire_cred
+OM_uint32 INTERFACE krb5_gss_inquire_cred
PROTOTYPE( (krb5_context,
OM_uint32 *, /* minor_status */
gss_cred_id_t, /* cred_handle */
gss_OID_set * /* mechanisms */
));
-OM_uint32 krb5_gss_inquire_context
+OM_uint32 INTERFACE krb5_gss_inquire_context
PROTOTYPE( (krb5_context,
OM_uint32*, /* minor_status */
gss_ctx_id_t, /* context_handle */
int* /* locally_initiated */
));
-OM_uint32 kg_get_context();
+OM_uint32 INTERFACE kg_get_context();
#endif /* _GSSAPIP_KRB5_H_ */
/* XXX what happens when the default credentials expire or are invalidated? */
-OM_uint32
+OM_uint32 INTERFACE
kg_get_defcred(minor_status, cred)
OM_uint32 *minor_status;
gss_cred_id_t *cred;
return(GSS_S_COMPLETE);
}
-OM_uint32
+OM_uint32 INTERFACE
kg_release_defcred(minor_status)
OM_uint32 *minor_status;
{
return(krb5_gss_release_cred(kg_context, minor_status, &defcred));
}
-OM_uint32
+OM_uint32 INTERFACE
kg_get_context()
{
if (kg_context)
#define gss_krb5_nt_machine_uid_name gss_nt_machine_uid_name
#define gss_krb5_nt_string_uid_name gss_nt_string_uid_name
-OM_uint32 gss_krb5_get_tkt_flags
+OM_uint32 INTERFACE gss_krb5_get_tkt_flags
PROTOTYPE((OM_uint32 *minor_status,
gss_ctx_id_t context_handle,
krb5_flags *ticket_flags));
*/
#include "gssapiP_krb5.h"
+#ifndef _MSDOS
#include <pwd.h>
#ifdef USE_STRING_H
#include <string.h>
* GSS_S_FAILURE if memory allocation fails
*/
-OM_uint32
+OM_uint32 INTERFACE
krb5_gss_import_name(context, minor_status, input_name_buffer,
input_name_type, output_name)
krb5_context context;
*output_name = (gss_name_t) princ;
return(GSS_S_COMPLETE);
}
+#endif
#include "gssapiP_krb5.h"
-OM_uint32
+OM_uint32 INTERFACE
krb5_gss_indicate_mechs(context, minor_status, mech_set)
krb5_context context;
OM_uint32 *minor_status;
return(0);
}
-OM_uint32
+OM_uint32 INTERFACE
krb5_gss_init_sec_context(context, minor_status, claimant_cred_handle,
context_handle, target_name, mech_type,
req_flags, time_req, input_chan_bindings,
}
} else {
unsigned char *ptr;
+ char *sptr;
krb5_data ap_rep;
krb5_ap_rep_enc_part *ap_rep_data;
return(GSS_S_DEFECTIVE_TOKEN);
}
- TREAD_STR(ptr, ap_rep.data, ap_rep.length);
+ sptr = (char *) ptr; /* PC compiler bug */
+ TREAD_STR(sptr, ap_rep.data, ap_rep.length);
/* decode the ap_rep */
if (code = krb5_rd_rep(context, &ap_rep, ctx->subkey, &ap_rep_data)) {
#include "gssapiP_krb5.h"
-OM_uint32
+OM_uint32 INTERFACE
krb5_gss_inquire_context(context, minor_status, context_handle, initiator_name,
acceptor_name, lifetime_rec, mech_type, ret_flags,
locally_initiated)
#include "gssapiP_krb5.h"
-OM_uint32
+OM_uint32 INTERFACE
krb5_gss_inquire_cred(context, minor_status, cred_handle, name, lifetime_ret,
cred_usage, mechanisms)
krb5_context context;
*/
#include "gssapiP_krb5.h"
-#include <netinet/in.h>
#include <krb5/rsa-md5.h>
static krb5_error_code
/* if signonly is true, ignore conf_req, conf_state,
and do not encode the ENC_TYPE, MSG_LENGTH, or MSG_TEXT fields */
-OM_uint32
+OM_uint32 INTERFACE
kg_seal(minor_status, context_handle, conf_req_flag, qop_req,
input_message_buffer, conf_state, output_message_buffer, toktype)
OM_uint32 *minor_status;
#include "gssapiP_krb5.h"
#include <memory.h>
-#include <netinet/in.h>
#include <krb5/rsa-md5.h>
/* message_buffer is an input if SIGN, output if SEAL, and ignored if DEL_CTX
conf_state is only valid if SEAL.
*/
-OM_uint32
+OM_uint32 INTERFACE
kg_unseal(minor_status, context_handle, input_token_buffer, message_buffer,
conf_state, qop_state, toktype)
OM_uint32 *minor_status;
#include "gssapiP_krb5.h"
-OM_uint32
+OM_uint32 INTERFACE
gss_accept_sec_context(minor_status, context_handle, verifier_cred_handle,
input_token, input_chan_bindings, src_name, mech_type,
output_token, ret_flags, time_rec, delegated_cred_handle)
delegated_cred_handle));
}
-OM_uint32
+OM_uint32 INTERFACE
gss_acquire_cred(minor_status, desired_name, time_req, desired_mechs,
cred_usage, output_cred_handle, actual_mechs, time_rec)
OM_uint32 *minor_status;
time_rec));
}
-OM_uint32
+OM_uint32 INTERFACE
gss_compare_name(minor_status, name1, name2, name_equal)
OM_uint32 *minor_status;
gss_name_t name1;
name2, name_equal));
}
-OM_uint32
+OM_uint32 INTERFACE
gss_context_time(minor_status, context_handle, time_rec)
OM_uint32 *minor_status;
gss_ctx_id_t context_handle;
time_rec));
}
-OM_uint32
+OM_uint32 INTERFACE
gss_delete_sec_context(minor_status, context_handle, output_token)
OM_uint32 *minor_status;
gss_ctx_id_t *context_handle;
context_handle, output_token));
}
-OM_uint32
+OM_uint32 INTERFACE
gss_display_name(minor_status, input_name, output_name_buffer, output_name_type)
OM_uint32 *minor_status;
gss_name_t input_name;
output_name_buffer, output_name_type));
}
-OM_uint32
+OM_uint32 INTERFACE
gss_display_status(minor_status, status_value, status_type,
mech_type, message_context, status_string)
OM_uint32 *minor_status;
status_string));
}
-OM_uint32
+OM_uint32 INTERFACE
gss_import_name(minor_status, input_name_buffer, input_name_type, output_name)
OM_uint32 *minor_status;
gss_buffer_t input_name_buffer;
input_name_type, output_name));
}
-OM_uint32
+OM_uint32 INTERFACE
gss_indicate_mechs(minor_status, mech_set)
OM_uint32 *minor_status;
gss_OID_set *mech_set;
return(krb5_gss_indicate_mechs(kg_context, minor_status, mech_set));
}
-OM_uint32
+OM_uint32 INTERFACE
gss_init_sec_context(minor_status, claimant_cred_handle, context_handle,
target_name, mech_type, req_flags, time_req,
input_chan_bindings, input_token, actual_mech_type,
time_rec));
}
-OM_uint32
+OM_uint32 INTERFACE
gss_inquire_context(minor_status, context_handle, initiator_name, acceptor_name,
lifetime_rec, mech_type, ret_flags,
locally_initiated)
mech_type, ret_flags, locally_initiated));
}
-OM_uint32
+OM_uint32 INTERFACE
gss_inquire_cred(minor_status, cred_handle, name, lifetime_ret,
cred_usage, mechanisms)
OM_uint32 *minor_status;
name, lifetime_ret, cred_usage, mechanisms));
}
-OM_uint32
+OM_uint32 INTERFACE
gss_process_context_token(minor_status, context_handle, token_buffer)
OM_uint32 *minor_status;
gss_ctx_id_t context_handle;
context_handle, token_buffer));
}
-OM_uint32
+OM_uint32 INTERFACE
gss_release_cred(minor_status, cred_handle)
OM_uint32 *minor_status;
gss_cred_id_t *cred_handle;
return(krb5_gss_release_cred(kg_context, minor_status, cred_handle));
}
-OM_uint32
+OM_uint32 INTERFACE
gss_release_name(minor_status, input_name)
OM_uint32 *minor_status;
gss_name_t *input_name;
return(krb5_gss_release_name(kg_context, minor_status, input_name));
}
-OM_uint32
+OM_uint32 INTERFACE
gss_release_buffer(minor_status, buffer)
OM_uint32 *minor_status;
gss_buffer_t buffer;
buffer));
}
-OM_uint32
+OM_uint32 INTERFACE
gss_release_oid_set(minor_status, set)
OM_uint32* minor_status;
gss_OID_set *set;
return(generic_gss_release_oid_set(minor_status, set));
}
-OM_uint32
+OM_uint32 INTERFACE
gss_seal(minor_status, context_handle, conf_req_flag, qop_req,
input_message_buffer, conf_state, output_message_buffer)
OM_uint32 *minor_status;
conf_state, output_message_buffer));
}
-OM_uint32
+OM_uint32 INTERFACE
gss_sign(minor_status, context_handle, qop_req, message_buffer, message_token)
OM_uint32 *minor_status;
gss_ctx_id_t context_handle;
qop_req, message_buffer, message_token));
}
-OM_uint32
+OM_uint32 INTERFACE
gss_unseal(minor_status, context_handle, input_message_buffer,
output_message_buffer, conf_state, qop_state)
OM_uint32 *minor_status;
conf_state, qop_state));
}
-OM_uint32
+OM_uint32 INTERFACE
gss_verify(minor_status, context_handle, message_buffer,
token_buffer, qop_state)
OM_uint32 *minor_status;
#include "gssapiP_krb5.h"
-OM_uint32
+OM_uint32 INTERFACE
krb5_gss_process_context_token(context, minor_status, context_handle,
token_buffer)
krb5_context context;
#include "gssapiP_krb5.h"
-OM_uint32
+OM_uint32 INTERFACE
krb5_gss_release_cred(context, minor_status, cred_handle)
krb5_context context;
OM_uint32 *minor_status;
#include "gssapiP_krb5.h"
-OM_uint32
+OM_uint32 INTERFACE
krb5_gss_release_name(context, minor_status, input_name)
krb5_context context;
OM_uint32 *minor_status;
#include "gssapiP_krb5.h"
-OM_uint32
+OM_uint32 INTERFACE
krb5_gss_seal(context, minor_status, context_handle, conf_req_flag,
qop_req, input_message_buffer, conf_state,
output_message_buffer)
#include "gssapiP_krb5.h"
-OM_uint32
+OM_uint32 INTERFACE
krb5_gss_sign(context, minor_status, context_handle,
qop_req, message_buffer,
message_token)
#include "gssapiP_krb5.h"
-OM_uint32
+OM_uint32 INTERFACE
krb5_gss_unseal(context, minor_status, context_handle,
input_message_buffer, output_message_buffer,
conf_state, qop_state)
#include "gssapiP_krb5.h"
#include <memory.h>
-krb5_error_code
+krb5_error_code INTERFACE
kg_checksum_channel_bindings(cb, cksum, bigend)
gss_channel_bindings_t cb;
krb5_checksum *cksum;
static unsigned char zeros[8] = {0,0,0,0,0,0,0,0};
-int kg_confounder_size(ed)
+int INTERFACE
+kg_confounder_size(ed)
krb5_gss_enc_desc *ed;
{
/* XXX Is this an abstraction violation? */
return(ed->eblock.crypto_entry->block_length);
}
-krb5_error_code
+krb5_error_code INTERFACE
kg_make_confounder(ed, buf)
krb5_gss_enc_desc *ed;
unsigned char *buf;
return(krb5_random_confounder( ed->eblock.crypto_entry->block_length, buf));
}
-int kg_encrypt_size(ed, n)
+int INTERFACE
+kg_encrypt_size(ed, n)
krb5_gss_enc_desc *ed;
int n;
{
return(krb5_encrypt_size(n, ed->eblock.crypto_entry));
}
-krb5_error_code
+krb5_error_code INTERFACE
kg_encrypt(ed, iv, in, out, length)
krb5_gss_enc_desc *ed;
krb5_pointer iv;
/* length is the length of the cleartext. */
-krb5_error_code
+krb5_error_code INTERFACE
kg_decrypt(ed, iv, in, out, length)
krb5_gss_enc_desc *ed;
krb5_pointer iv;
static unsigned char zeros[16] = {0,0,0,0, 0,0,0,0, 0,0,0,0, 0,0,0,0};
-krb5_error_code
+krb5_error_code INTERFACE
kg_make_seed(key, seed)
krb5_keyblock *key;
unsigned char *seed;
#include "gssapiP_krb5.h"
-krb5_error_code
+krb5_error_code INTERFACE
kg_make_seq_num(ed, direction, seqnum, cksum, buf)
krb5_gss_enc_desc *ed;
int direction;
- int seqnum;
+ krb5_int32 seqnum;
unsigned char *cksum;
unsigned char *buf;
{
#include "gssapiP_krb5.h"
-OM_uint32
+OM_uint32 INTERFACE
krb5_gss_verify(context, minor_status, context_handle,
message_buffer, token_buffer,
qop_state)